oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 1 )

2018 ( 1 )

2016 ( 6 )

2015 ( 11 )

Custom range...

Search Results: 1 - 10 of 384 matches for " Subramaniam Shamala "
All listed articles are free for downloading (OA Articles)
Page 1 /384
Display every page Item
Design and Implementation of a Lightweight Security Model to Prevent IEEE 802.11 Wireless DoS Attacks
Malekzadeh Mina,Abdul Ghani AbdulAzim,Subramaniam Shamala
EURASIP Journal on Wireless Communications and Networking , 2011,
Abstract: The protection offered by IEEE 802.11 security protocols such as WEP, WPA, and WPA2 does not govern wireless control frames. The control frames are transmitted in clear-text form, and there is no way to verify their validity by the recipients. The flaw of control frames can be exploited by attackers to carry out DoS attacks and directly disrupt the availability of the wireless networks. In this work, focusing on resource limitation in the wireless networks, a new lightweight noncryptographic security solution is proposed to prevent wireless DoS attacks. In order to prove the ability of the proposed model and quantify its performance and capabilities, a simulation topology is developed, and extensive experiments are carried out. Based on the acquired results, it is concluded that the model successfully prevents wireless DoS attacks, while the security cost is not remarkable compared to the model achievements.
Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks
Mina Malekzadeh,Abdul Azim Abdul Ghani,Shamala Subramaniam
Journal of Computer Networks and Communications , 2010, DOI: 10.1155/2010/218271
Abstract: In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques. 1. Introduction Wireless networks have gained popularity in many critical areas such as in healthcare centers, hospitals, police departments, military facilities, and airports. Therefore, it is extremely important to enhance the network security in order to protect the information that resides within the network. To achieve this goal, different security protocols have been designed, among which are WEP, WPA, and WPA2. Despite the presence of these protocols, security is still the main concern in the wireless networks. Air transmission is a vulnerable medium, and it provides opportunity for the attackers to intercept the information that will be later used to launch different types of attacks. Consequently, it is important to know different kind of security attacks in order to defend the networks against the attacks and to guarantee the reliability of the wireless networks. Numerous hands-on courses and laboratory exercises have been developed to investigate security flaws in networks and to determine best ways to prevent the attackers from compromising the security of such systems. However, most of the existing laboratory exercises are investigating the wired networks. Meanwhile, most existing wireless laboratory exercises mainly focus on the methods to crack the WEP security protocol [1–4]. In this work, on the contrary, we design a series of laboratory exercises for IEEE 802.11 wireless network security courses. The exercises focus on the types of attacks that have not received much attention in the current wireless laboratories. The laboratory exercises are conducted for students in both graduate and
Frame Aggregation in Wireless Networks: Techniques and Issues
Saif Anwar,Othman Mohamed,Subramaniam Shamala,Abdul Hamid Nor
IETE Technical Review , 2011,
Abstract: The timing and headers overheads of IEEE 802.11 PHY and MAC layers consume a large part of the channel time leading to performance degradation especially at higher data rates. Several enhancements at both the PHY and MAC layers have been proposed in order to reduce these overheads and increase the channel utilization. A key enhancement is frame aggregation in which the timing and headers overheads are reduced by aggregating multiple frames into a single large frame and then transmit it in a single channel access. This paper addresses the frame aggregation techniques that have been proposed for the next generation wireless networks and the aggregation techniques that are adopted by IEEE 802.11n standard. It also highlights the aggregation issues that need to be investigated in order to further enhance the frame aggregation performance.
The Delay with New-Additive Increase Multiplicative Decrease Congestion Avoidance and Control Algorithm
Hayder Natiq Jasem,Zuriati Ahmad Zukarnain,Mohamed Othman,Shamala Subramaniam
Information Technology Journal , 2010,
Abstract: As the Internet becomes increasingly heterogeneous, the issue of congestion control becomes ever more important. And the queue length and end-to-end (congestion) delays are some of the important things in term of congestion avoidance and control mechanisms. In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. And we will use the Droptail mechanism as Active Queue Management (AQM) in the bottleneck router. After implementation of our new approach with different number of flows, we will measure the delay for two types of delays (queuing delay and end-to-end delay), we expect the delay will be less with using our mechanism comparing with the mechanism in the previous study. Now and after got this results as low delay for bottleneck link case, we know the New-AIMD mechanism work as well under the network condition in the experiments.
Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution
Abudhahir Buhari,Zuriati Ahmad Zukarnain,Shamala K. Subramaniam,Hisham Zainuddin
International Journal of Network Security & Its Applications , 2012,
Abstract: We propose a multi-party quantum key distribution protocol which enables all the receivers can converttheir respective private shared key into common secret key without use of entanglement. The maincomponent of our protocol is a simple post quantum scheme for achieving the higher secret key rate.Efficiency of the extracted key rate is almost 100%. We assume that sender established the pre-sharedprivate secret keys and a common secret number with the receivers. Our proposed scheme sends n stringsof number to n receivers in the public channel to convert their respective shared secret key into commonsecret key in the presence of Eve. We also analyze the complexity of attack by the adversary to guess thesecret key
A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel
Abudhahir Buhari,Zuriati Ahmad Zukarnain,Shamala K. Subramaniam,Hisham Zainuddin
International Journal of Network Security & Its Applications , 2012,
Abstract: In this paper, we propose a quantum user authentication protocol with a single photon based on shortshared secret key and quantum bit error ratio verification. In this scheme, usage of proposeddeterministic quantum key distribution technique and simple verification in a public channel culminatereduced photon transmission. Security's analysis proves proposed scheme is resistant to impostors’attacks and eavesdropper. Furthermore, proposed protocol can extend to multiparty environment andpermits to re-use many times of the shared secret key without revealing it.
Design and Implementation of a Lightweight Security Model to Prevent IEEE 802.11 Wireless DoS Attacks
Mina Malekzadeh,Abdul Azim Abdul Ghani,Shamala Subramaniam
EURASIP Journal on Wireless Communications and Networking , 2011, DOI: 10.1155/2011/105675
Abstract:
Evaluation Study for Delay and Link Utilization with the New-Additive Increase Multiplicative Decrease Congestion Avoidance and Control Algorithm
Hayder Natiq Jasem,Zuriati Ahmad Zukarnain,Mohamed Othman,Shamala Subramaniam
Computer Science , 2010,
Abstract: As the Internet becomes increasingly heterogeneous, the issue of congestion avoidance and control becomes ever more important. And the queue length, end-to-end delays and link utilization is some of the important things in term of congestion avoidance and control mechanisms. In this work we continue to study the performances of the New-AIMD (Additive Increase Multiplicative Decrease) mechanism as one of the core protocols for TCP congestion avoidance and control algorithm, we want to evaluate the effect of using the AIMD algorithm after developing it to find a new approach, as we called it the New-AIMD algorithm to measure the Queue length, delay and bottleneck link utilization, and use the NCTUns simulator to get the results after make the modification for the mechanism. And we will use the Droptail mechanism as the active queue management mechanism (AQM) in the bottleneck router. After implementation of our new approach with different number of flows, we expect the delay will less when we measure the delay dependent on the throughput for all the system, and also we expect to get end-to-end delay less. And we will measure the second type of delay a (queuing delay), as we shown in the figure 1 bellow. Also we will measure the bottleneck link utilization, and we expect to get high utilization for bottleneck link with using this mechanism, and avoid the collisions in the link.
AN AIS INSPIRED ALERT REDUCTION MODEL
Mohammad Mahboubian,Nur Izura Udzir,Shamala Subramaniam,Nor Asila Wati Abdul Hamid
International Journal of Cyber-Security and Digital Forensics , 2012,
Abstract: One of the most important topics in the field of intrusion detection systems is to find a solution to reduce the overwhelming alerts generated by IDSs in the network. Inspired by danger theory which is one of the most important theories in artificial immune system (AIS) we proposed a complementary subsystem for IDS which can be integrated into any existing IDS models to aggregate the alerts in order to reduce them, and subsequently reduce false alarms among the alerts. After evaluation using different datasets and attack scenarios and also different set of rules, in best case our model managed to aggregate the alerts by the average rate of 97.5 percent.
Evaluation of a Dengue NS1 capture ELISA assay for the rapid detection of Dengue
Shamala Devi Sekaran, Ew Cheng Lan, Kanthesh Basalingappa Mahesawarappa, Ramapraba Appanna and Geetha Subramaniam
Journal of Infection in Developing Countries , 2007,
Abstract: Background: Early definitive diagnosis of dengue virus infections is essential for the timely management of dengue infections. In this study, we evaluated the PanBio Dengue NS1 Antigen Capture ELISA for the detection of dengue virus NS1 antigen in patients’ sera.Methodology: A total of 206 serum samples and 8 viral isolates were used to evaluate the kits. These samples were analysed using TaqMan RT-PCR, an in-house IgM ELISA, a hemagglutination inhibition (HI) assay, and the PanBio NS1 ELISA.Results: Out of the 66 culture positive sera that tested positive using the TaqMan RT-PCR, NS1 antigen was detected in 91% with sensitivity being higher in primary acute sera than in secondary acute sera. The detection rate by PanBio Dengue NS1 Antigen Capture ELISA in the absence of IgM was 91.6% as compared to 48.3% in the presence of IgM. The overall sensitivity of the PanBio Dengue NS1 Antigen Capture ELISA in the detection of dengue in culture positive sera was 91.6%.Conclusions: The PanBio ELISA is a highly specific and sensitive assay for the detection of dengue NS1 antigen. The assay was able to detect NS1 antigen in convalescent sera up until day 10 of infection, whereas viral RNA was undetectable via PCR by day 7. However, as it is most effective during the acute phase of the disease, this kit should be used together with the IgM to increase the sensitivity of detection, especially in areas with higher prevalence of secondary dengue virus infections.
Page 1 /384
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.